This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis β
Q1What is this vulnerability? (Essence + Consequences)
π¨ **Essence**: n8n (workflow automation tool) has a critical code injection flaw. π **Consequences**: Attackers can execute malicious code, leading to **full system compromise** (RCE).
Q2Root Cause? (CWE/Flaw)
π‘οΈ **Root Cause**: **CWE-94** (Code Injection). The flaw allows authenticated users to inject and execute arbitrary code via the Git node.
Q3Who is affected? (Versions/Components)
π¦ **Affected**: **n8n** by n8n-io. Versions **0.121.2 and earlier** are vulnerable. Both self-hosted and Cloud instances are at risk.
Q4What can hackers do? (Privileges/Data)
π **Attacker Capabilities**: With **Low Privileges** (authenticated user), hackers can overwrite critical files and execute untrusted code. Result: **High Impact** on Confidentiality, Integrity, and Availability.
π§ **No Patch?**: **Isolate** the instance. Restrict network access to authenticated users only. Disable the **Git node** if possible. Monitor logs for file write anomalies.
Q10Is it urgent? (Priority Suggestion)
β‘ **Urgency**: **CRITICAL**. CVSS Score is **High** (9.8+ implied by H/H/H). Immediate patching to v1.121.3+ is mandatory for all n8n deployments.